Cybersecurity, Privacy, & AI

Trending Now
Report From FDLI Annual Meeting: FDA’s Expanding Use of AI – What Regulated Industry Should Know • NIST Revises SP 800-70 | National Checklist Program for IT Products: Guidelines for Checklist Users and Developers • Cyberattacks Are Now Part of US Counterterrorism Strategy • What’s Driving the Air Force OT Cyber Office’s Massive FY 2027 Budget Request? • DHS Units to Re-Up Contract With Controversial Mobile Device Data Extractor

NIST’s Zero Trust Taxonomy Introduces Components, Threats and Migration Routes

NIST has published a draft Zero Trust Architecture special publication 800.207. The purpose is to develop a technology-neutral lexicon of the logical components of a zero trust strategy, define ZTA, describe possible deployment scenarios, and highlight threats.

The primary purpose of the document is to develop a standard taxonomy for ZTA components rather than give guidance or recommendations on how to deploy them. Nevertheless, the document provides a very detailed introduction to the components, their interrelationship, the problems involved, and how the components could be implemented in a migration to a zero trust architecture.

Zero trust is a security approach designed to counter the loss of a defendable perimeter in the modern distributed, cloud encompassing, remote working infrastructure. With no “visible” perimeter, zero trust suggests that enterprises consider everything – whether part of the internet or owned by the enterprise – to be hostile.

Stay compliant and protected with daily updates on cybersecurity, data privacy, and federal oversight with our Cyber & Privacy newsletter, delivering up-to-the-minute intelligence Monday–Saturday — Subscribe here.